Exploits Wiki
exploitswiki
https://exploits.miraheze.org/wiki/Main_Page
MediaWiki 1.40.1
first-letter
Media
Special
Talk
User
User talk
Exploits Wiki
Exploits Wiki talk
File
File talk
MediaWiki
MediaWiki talk
Template
Template talk
Help
Help talk
Category
Category talk
Module
Module talk
Main Page
0
1
1
2023-10-31T15:44:40Z
MediaWiki default
1
Create main page
wikitext
text/x-wiki
__NOTOC__
== Welcome to {{SITENAME}}! ==
This Main Page was created automatically and it seems it hasn't been replaced yet.
=== For the bureaucrat(s) of this wiki ===
Hello, and welcome to your new wiki! Thank you for choosing Miraheze for the hosting of your wiki, we hope you will enjoy our hosting.
You can immediately start working on your wiki or whenever you want.
Need help? No problem! We will help you with your wiki as needed. To start, try checking out these helpful links:
* [[mw:Special:MyLanguage/Help:Contents|MediaWiki guide]] (e.g. navigation, editing, deleting pages, blocking users)
* [[meta:Special:MyLanguage/FAQ|Miraheze FAQ]]
* [[meta:Special:MyLanguage/Request features|Request settings changes on your wiki]]. (Extensions, Skin and Logo/Favicon changes should be done through [[Special:ManageWiki]] on your wiki, see [[meta:Special:MyLanguage/ManageWiki|ManageWiki]] for more information.)
==== I still don't understand X! ====
Well, that's no problem. Even if something isn't explained in the documentation/FAQ, we are still happy to help you. You can find us here:
* [[meta:Special:MyLanguage/Help center|On our own Miraheze wiki]]
* On [[phab:|Phabricator]]
* On [https://miraheze.org/discord Discord]
* On IRC in #miraheze on irc.libera.chat ([irc://irc.libera.chat/%23miraheze direct link]; [https://web.libera.chat/?channel=#miraheze webchat])
=== For visitors of this wiki ===
Hello, the default Main Page of this wiki (this page) has not yet been replaced by the bureaucrat(s) of this wiki. The bureaucrat(s) might still be working on a Main Page, so please check again later!
21236ac3f8d65e5563b6da6b70815ca6bf1e6616
2
1
2023-10-31T20:34:35Z
AverseABFun
2
wikitext
text/x-wiki
__NOTOC__
== Welcome to the Exploits Wiki! ==
Pretty much nothing is finished, but you can check out the [[Exploits List|full list of exploits]], or [[Exploits Timeline|the timeline]].
db55c11c90ce74b81df281033d2a1e1c917d9f30
6
2
2023-11-01T14:05:04Z
AverseABFun
2
wikitext
text/x-wiki
__NOTOC__
== Welcome to the Exploits Wiki! ==
Pretty much nothing is finished, but you can check out the [[Exploits List|full list of exploits]].
165acdf9b192b30ecb35147c8986809257ddb4ec
Exploits List
0
3
5
2023-11-01T14:04:28Z
AverseABFun
2
Created page with "Here is the list, with no particular ordering. * LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web"
wikitext
text/x-wiki
Here is the list, with no particular ordering.
* LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web
b33d2037c8a0fd53f27d5b19044f9e2e09defbd9
7
5
2023-11-01T16:01:34Z
Wingetov
4
wikitext
text/x-wiki
This is a list of exploits found that can be used to bypass administrative restrictions.
==Formal Exploits==
These are [insert description here]
* LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web
==Informal Explots==
These are [insert description here]
17d1aa031310d54aca85efcf81716d2a91e58f2c
8
7
2023-11-01T16:03:13Z
AverseABFun
2
/* Formal Exploits */
wikitext
text/x-wiki
This is a list of exploits found that can be used to bypass administrative restrictions.
==Formal Exploits==
These are true exploits that aren't just using a different mode or something.
* LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web
==Informal Explots==
These are [insert description here]
25b5a132d6ca8378ac4fe4eb3330f286408e5f40
9
8
2023-11-01T16:06:00Z
AverseABFun
2
/* Informal Explots */
wikitext
text/x-wiki
This is a list of exploits found that can be used to bypass administrative restrictions.
==Formal Exploits==
These are true exploits that aren't just using a different mode or something.
* LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web
==Informal Exploits==
These are exploits that aren't really exploits, for example using the sign language version of Xtramath to disable the timer
* ASL Xtramath - (no link)
af8edd8094a164369db1c285dae06ffef926d674
10
9
2023-11-01T16:12:57Z
Wingetov
4
wikitext
text/x-wiki
This is a list of exploits found that can be used to bypass administrative restrictions.
==Formal Exploits==
These are true exploits that involve using bypasses/backdoors.
* LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web
==Informal Exploits==
These are everything else, for example, abusing design.
* ASL Xtramath: Using the American Sign Language on XtraMath disables the timer.
6da048c044eedc7d7a4cd5b349bf70c4b40ce357
11
10
2023-11-01T18:51:39Z
AverseABFun
2
/* Formal Exploits */
wikitext
text/x-wiki
This is a list of exploits found that can be used to bypass administrative restrictions.
==Formal Exploits==
These are true exploits that involve using bypasses/backdoors.
* LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web
* Dextensify: https://dextensify.pages.dev/main
* CAUB: https://caub.glitch.me/
* Sync Internals Password Extractor(SIPE): https://sipe.glitch.me/
==Informal Exploits==
These are everything else, for example, abusing design.
* ASL Xtramath: Using the American Sign Language on XtraMath disables the timer.
850a5626c58ec4725e08455f9fb984612f178413
12
11
2023-11-02T13:46:57Z
AverseABFun
2
/* Informal Exploits */
wikitext
text/x-wiki
This is a list of exploits found that can be used to bypass administrative restrictions.
==Formal Exploits==
These are true exploits that involve using bypasses/backdoors.
* LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web
* Dextensify: https://dextensify.pages.dev/main
* CAUB: https://caub.glitch.me/
* Sync Internals Password Extractor(SIPE): https://sipe.glitch.me/
==Informal Exploits==
These are everything else, for example, abusing design.
* ASL Xtramath: Using the American Sign Language on XtraMath disables the timer.
* Plotly: Getting the Plotly app from the Chrome Web Store allows you to go to Google eventually if you follow some long set of steps.
19f04a77b49b1f60768cfb7c5d2ff36595b10197
13
12
2023-11-15T13:43:43Z
107.191.79.90
0
wikitext
text/x-wiki
This is a list of exploits found that can be used to bypass administrative restrictions.
==Formal Exploits==
These are true exploits that involve using bypasses/backdoors.
* LTMEAT: https://github.com/AshtonDavies/LTMEAT-Web
* Dextensify: https://dextensify.pages.dev/main
* CAUB: https://caub.glitch.me/
* Sync Internals Password Extractor(SIPE): https://sipe.glitch.me/
==Informal Exploits==
These are everything else, for example, abusing design.
* ASL Xtramath: Using the American Sign Language on XtraMath disables the timer.
* Portkey: Several apps downloaded through the Chrome Web Store or the Play Store can be used to access the web by opening a series of links ''in the app itself, rather than by opening a new window''. Requires some experimentation, and won't work on all apps.
0f01779d345b337715350740deecac42ec808539